Sheetal Prasad - Academia.edu (original) (raw)

Papers by Sheetal Prasad

Research paper thumbnail of A Flexible and Investigation Approach for Encrypted Features Space Using Neural Network

IoT, Cloud and Data Science

Replication, in general, is defined as repeating a study's technique and assessing whether th... more Replication, in general, is defined as repeating a study's technique and assessing whether the previous finding re-occurs. Research can become replicable when a person can copy the same content and arrive at the same conclusion as the original study. In this paper, an approach control mechanism for article observation replicas is been proposed. The usage of encrypted pictures or encoded attribute plots has been shown to be successful in preventing unwanted approach to models. The approach's efficiency has only been verified in image organization models and semantic analysis models but not in article recognition models. For the first time, encoded feature plots have proved to be successful in the control of article observation replicas. A safe and efficient technique based on completely homomorphic encryption is used and its usefulness for a variety of real data is been demonstrated. The suggested technique is the first to directly replicate an algorithm on ciphertext, which ...

Research paper thumbnail of “Parallels”: Social justice through artmaking and the archives

YU-WRITE: Journal of Graduate Student Research in Education

Inspired by Thai artist Manit Sriwanichpoom (1997-2008), I created a series of photographic print... more Inspired by Thai artist Manit Sriwanichpoom (1997-2008), I created a series of photographic prints in 2019 called Sheila and the… (Figures 1-3) depicting in the foreground (in colour) my alter ego named “Sheila” against a black and white background of a historical event. Using a similar format, Parallels: Sheetal and the… (2022) (Figures 4-6) speaks to the shift that many have witnessed since the start of the Covid-19 pandemic. Both series address the ongoing cycles of historical events and colonial violence. I posit that by engaging in history through artmaking, students can better understand the cycles of colonial narratives and navigate social justice issues in our lived experiences.

Research paper thumbnail of Quantum Security for IoT to Secure Healthcare Applications and Their Data

IGI Global eBooks, Jun 3, 2022

Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing... more Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing can help to detect diseases by identifying and forecasting malfunctions. But there's a threat associated here (i.e., healthcare data among the most popular cybercriminal targets, IoT devices notoriously lacking in effective safeguards, and quantum computers on the brink of an encryption/decryption breakthrough). Health agencies need a security prognosis and treatment plan as soon as possible. Healthcare companies recently worry more about the quantum security threats. The biggest threat of healthcare data breaches has come in the form of identity theft. There should be a strong mechanism to combat the security gaps in existing healthcare industry. If the healthcare data are available on the network, an attacker may try to modify, intercept, or even view this data stream. With the use of quantum security, the quantum state of these photons changes alert the security pros that someone is trying to breach the link.

Research paper thumbnail of Power System Monitoring, Control and Protection for Network, IOT and Cyber Security

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Cyber Security Techniques for Internet of Things (IoT)

Quantum Cryptography and the Future of Cyber Security, 2020

The purpose of the cyber security policy is to provide guidelines on how to secure public and pri... more The purpose of the cyber security policy is to provide guidelines on how to secure public and private resources from cyberattacks. IoT devices are having challenges managing the personal information they collect and helps to people understand that information is managed by a system. Digital twins enhance development by allowing developers to directly manipulate the device's abstract version using programming instructions. It is required to think about possible attack vectors when tuning cyber security for the IoT environment concerns. So, a security administrator is required to think the about possible vulnerabilities of the environment. Supervision and protocols must also be developed for suppliers, manufacturers, vendors, etc. The deployment of consumer understanding to make best use of “smart” strategy, using their own “smart” minds is required. There is a need for a framework or other types of guidance for assessing IoT cyber security to provide an informed approach to secur...

Research paper thumbnail of Quantum Security for IoT to Secure Healthcare Applications and Their Data

Limitations and Future Applications of Quantum Cryptography, 2021

Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing... more Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing can help to detect diseases by identifying and forecasting malfunctions. But there's a threat associated here (i.e., healthcare data among the most popular cybercriminal targets, IoT devices notoriously lacking in effective safeguards, and quantum computers on the brink of an encryption/decryption breakthrough). Health agencies need a security prognosis and treatment plan as soon as possible. Healthcare companies recently worry more about the quantum security threats. The biggest threat of healthcare data breaches has come in the form of identity theft. There should be a strong mechanism to combat the security gaps in existing healthcare industry. If the healthcare data are available on the network, an attacker may try to modify, intercept, or even view this data stream. With the use of quantum security, the quantum state of these photons changes alert the security pros that someone...

Research paper thumbnail of A Comparative Study of the Adjustment of the Female and Male Students Studying at Higher Secondary Level

TechnoLearn An International Journal of Educational Technology, 2019

The higher secondary level is considered very crucial stage at educational level. The students ar... more The higher secondary level is considered very crucial stage at educational level. The students are at later adolescent stage trying to cope up with their psychological changes and their changing social roles. They have lot of stress for the indefinite future. This causes various adjustment problems for the students. These adjustment issues are different for both boys and girls as social norms, social stereotypes and social roles and expectations is different for both the genders and similarly the ways of solving adjustment problems is also different for both the boys and girls. The present paper compares the adjustment level of male and female students studying at higher secondary level.

Research paper thumbnail of A Flexible and Investigation Approach for Encrypted Features Space Using Neural Network

IoT, Cloud and Data Science

Replication, in general, is defined as repeating a study's technique and assessing whether th... more Replication, in general, is defined as repeating a study's technique and assessing whether the previous finding re-occurs. Research can become replicable when a person can copy the same content and arrive at the same conclusion as the original study. In this paper, an approach control mechanism for article observation replicas is been proposed. The usage of encrypted pictures or encoded attribute plots has been shown to be successful in preventing unwanted approach to models. The approach's efficiency has only been verified in image organization models and semantic analysis models but not in article recognition models. For the first time, encoded feature plots have proved to be successful in the control of article observation replicas. A safe and efficient technique based on completely homomorphic encryption is used and its usefulness for a variety of real data is been demonstrated. The suggested technique is the first to directly replicate an algorithm on ciphertext, which ...

Research paper thumbnail of “Parallels”: Social justice through artmaking and the archives

YU-WRITE: Journal of Graduate Student Research in Education

Inspired by Thai artist Manit Sriwanichpoom (1997-2008), I created a series of photographic print... more Inspired by Thai artist Manit Sriwanichpoom (1997-2008), I created a series of photographic prints in 2019 called Sheila and the… (Figures 1-3) depicting in the foreground (in colour) my alter ego named “Sheila” against a black and white background of a historical event. Using a similar format, Parallels: Sheetal and the… (2022) (Figures 4-6) speaks to the shift that many have witnessed since the start of the Covid-19 pandemic. Both series address the ongoing cycles of historical events and colonial violence. I posit that by engaging in history through artmaking, students can better understand the cycles of colonial narratives and navigate social justice issues in our lived experiences.

Research paper thumbnail of Quantum Security for IoT to Secure Healthcare Applications and Their Data

IGI Global eBooks, Jun 3, 2022

Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing... more Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing can help to detect diseases by identifying and forecasting malfunctions. But there's a threat associated here (i.e., healthcare data among the most popular cybercriminal targets, IoT devices notoriously lacking in effective safeguards, and quantum computers on the brink of an encryption/decryption breakthrough). Health agencies need a security prognosis and treatment plan as soon as possible. Healthcare companies recently worry more about the quantum security threats. The biggest threat of healthcare data breaches has come in the form of identity theft. There should be a strong mechanism to combat the security gaps in existing healthcare industry. If the healthcare data are available on the network, an attacker may try to modify, intercept, or even view this data stream. With the use of quantum security, the quantum state of these photons changes alert the security pros that someone is trying to breach the link.

Research paper thumbnail of Power System Monitoring, Control and Protection for Network, IOT and Cyber Security

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)

Research paper thumbnail of Cyber Security Techniques for Internet of Things (IoT)

Quantum Cryptography and the Future of Cyber Security, 2020

The purpose of the cyber security policy is to provide guidelines on how to secure public and pri... more The purpose of the cyber security policy is to provide guidelines on how to secure public and private resources from cyberattacks. IoT devices are having challenges managing the personal information they collect and helps to people understand that information is managed by a system. Digital twins enhance development by allowing developers to directly manipulate the device's abstract version using programming instructions. It is required to think about possible attack vectors when tuning cyber security for the IoT environment concerns. So, a security administrator is required to think the about possible vulnerabilities of the environment. Supervision and protocols must also be developed for suppliers, manufacturers, vendors, etc. The deployment of consumer understanding to make best use of “smart” strategy, using their own “smart” minds is required. There is a need for a framework or other types of guidance for assessing IoT cyber security to provide an informed approach to secur...

Research paper thumbnail of Quantum Security for IoT to Secure Healthcare Applications and Their Data

Limitations and Future Applications of Quantum Cryptography, 2021

Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing... more Quantum computation has the ability to revolutionize the treatment of patients. Quantum computing can help to detect diseases by identifying and forecasting malfunctions. But there's a threat associated here (i.e., healthcare data among the most popular cybercriminal targets, IoT devices notoriously lacking in effective safeguards, and quantum computers on the brink of an encryption/decryption breakthrough). Health agencies need a security prognosis and treatment plan as soon as possible. Healthcare companies recently worry more about the quantum security threats. The biggest threat of healthcare data breaches has come in the form of identity theft. There should be a strong mechanism to combat the security gaps in existing healthcare industry. If the healthcare data are available on the network, an attacker may try to modify, intercept, or even view this data stream. With the use of quantum security, the quantum state of these photons changes alert the security pros that someone...

Research paper thumbnail of A Comparative Study of the Adjustment of the Female and Male Students Studying at Higher Secondary Level

TechnoLearn An International Journal of Educational Technology, 2019

The higher secondary level is considered very crucial stage at educational level. The students ar... more The higher secondary level is considered very crucial stage at educational level. The students are at later adolescent stage trying to cope up with their psychological changes and their changing social roles. They have lot of stress for the indefinite future. This causes various adjustment problems for the students. These adjustment issues are different for both boys and girls as social norms, social stereotypes and social roles and expectations is different for both the genders and similarly the ways of solving adjustment problems is also different for both the boys and girls. The present paper compares the adjustment level of male and female students studying at higher secondary level.